首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
"AngeIIPRO SPM"安全策略管理系统是一个集成化的防卫体系,遵循P2DR模型,支持分布式结构,通过多种技术手段的融合帮助客户有效达成在物理、链路、操作、网络、设备、系统、应用、数据及人员等方面的安全策略集中定制、自动分发和自动实现,以此来构建一套完整而系统的安全保障措施,实现对整个网络风险的自我防御.  相似文献   

2.
CTBI provides a simple mechanism that bonds multiple levels of multiple lanes (electrical and optical) in a single step through 66-bit block striping with low overhead and no need lo backpressure or flow control the MAC layer, and allows for a very simple optical module even if the number of optical lanes and electrical lanes are not equal (in / n).  相似文献   

3.
Chaos, apparently disordered behaviour which is nonetheless deterministic, is a universal phenomenon which occurs in many systems in all areas of science. For it to take place, the equations describing the situation must be nonlinear and, therefore, they are rarely solvable in closed form. Since the advent of fast digital computers, the theory of nonlinear systems has become much more accessible to study and is now undergoing rapid development. The authors review some of the universal aspects of chaos and its ramifications in the field of electronics  相似文献   

4.
动态功耗管理通过关闭空闲的系统部件来减小电子系统的功耗。如何提高预测的准确度是当前基于预测动态功耗管理(DPM)研究的主要问题。基于预测的DPM策略假设系统部件访问时间具有关联性,当前应用最为广泛的是指数滑动平均方法,但其应对突发事件的能力不强。本文基于指数滑动平均改进模型,对突发事件进行数学定义,提出一种自适应的DPM预测策略,在面对突发的长延时或短延时情况下,系统都能自适应调整,提高了预测的准确度,优于现有策略。  相似文献   

5.
Electromigration is a major reliability concern in today’s integrated circuits due to the aggressive scaling of interconnect dimensions and the ever-increasing current densities at operation. In addition, the recent introduction of new materials and processing schemes lead to even more challenges in guaranteeing interconnect robustness against electromigration failure. In this article, we review basic electromigration physics in which the main differences between Al- and Cu-based interconnects relevant to electromigration are covered. We also discuss recent process-related advances in electromigration reliability such as the use of alloys and metal caps. Next, the impact of low-k inter-level dielectrics (ILD) on electromigration performance is addressed. Finally, the methodology of electromigration lifetime extrapolation, including reliability assessments of more complex interconnect geometries, is covered.  相似文献   

6.
An introduction to Web Services   总被引:1,自引:0,他引:1  
This paper provides an introduction to Web Services. A brief history of Web Services is given, leading into an overview of the key Web Services technologies. The paper describes the way in which the IT industry has embraced Web Services and the uses to which the technologies are currently being applied. It concludes with a view of the role of both the key developers and standards bodies in the creation of Web Services and discusses the ways in which this process needs to be supported in order for Web Services to evolve. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   

7.
8.
An introduction to contemporary cryptology   总被引:2,自引:0,他引:2  
An appraisal is given of the current status, both technical and nontechnical, of cryptologic research. The principal concepts of both secret-key and public-key cryptography are described. C.E. Shanon's theory of secrecy (1949) and G.J. Simon's theory authenticity (1984) are reviewed for the insight that they give into practical cryptographic systems. Public-key concepts are illustrated through consideration of the Diffie-Hellman public-key-distribution system and the Rivest-Shamir-Adleman public-key cryptosystem. The subtleties of cryptographic protocols are shown through consideration of some such specific protocols  相似文献   

9.
10.
Quartz oscillators and rubidium, cesium, and hydrogen atomic frequency standards are described in terms of the physics of operation. Sources of frequency instability and inaccuracy are given. The author's intention is to provide a basis for characterization of the more practical aspects of commercially available frequency standards, and to present a comparison of such standards which may be useful in selecting devices for various applications. Emphasis is laid on stability performance of precision frequency standards, but some discussion is also given of other physical characteristics and cost considerations  相似文献   

11.
12.
IC testing has evolved from the patterns established some years ago in the production of semiconductors. Since manual testing cannot meet the complex needs indigenous to IC manufacture, highly sophisticated instruments and test systems have developed that are automatically programmed by computer, tape, or printed-circuit card. This article focuses on many of the problems encountered and techniques employed, and also the requirements imposed on automatic IC testing systems.  相似文献   

13.
An introduction to factor graphs   总被引:3,自引:0,他引:3  
Graphical models such as factor graphs allow a unified approach to a number of key topics in coding and signal processing such as the iterative decoding of turbo codes, LDPC codes and similar codes, joint decoding, equalization, parameter estimation, hidden-Markov models, Kalman filtering, and recursive least squares. Graphical models can represent complex real-world systems, and such representations help to derive practical detection/estimation algorithms in a wide area of applications. Most known signal processing techniques -including gradient methods, Kalman filtering, and particle methods -can be used as components of such algorithms. Other than most of the previous literature, we have used Forney-style factor graphs, which support hierarchical modeling and are compatible with standard block diagrams.  相似文献   

14.
15.
16.
Voice search is the technology underlying many spoken dialog systems (SDSs) that provide users with the information they request with a spoken query. The information normally exists in a large database, and the query has to be compared with a field in the database to obtain the relevant information. The contents of the field, such as business or product names, are often unstructured text. This article categorized spoken dialog technology into form filling, call routing, and voice search, and reviewed the voice search technology. The categorization was made from the technological perspective. It is important to note that a single SDS may apply the technology from multiple categories. Robustness is the central issue in voice search. The technology in acoustic modeling aims at improved robustness to environment noise, different channel conditions, and speaker variance; the pronunciation research addresses the problem of unseen word pronunciation and pronunciation variance; the language model research focuses on linguistic variance; the studies in search give rise to improved robustness to linguistic variance and ASR errors; the dialog management research enables graceful recovery from confusions and understanding errors; and the learning in the feedback loop speeds up system tuning for more robust performance. While tremendous achievements have been accomplished in the past decade on voice search, large challenges remain. Many voice search dialog systems have automation rates around or below 50% in field trials.  相似文献   

17.
An introduction to synthetic-aperture radar   总被引:3,自引:0,他引:3  
One way of achieving fine-resolution terrain imagery using airborne, side-looking radar is to boost frequency; another is to decrease along-track tracking. Neither is attractive. But they would have had to do were it not for coherent wave radar?upon which synthetic-aperture radar is premised. Using coherent radar, resolution can depend, not on the width of the beam, but on Doppler frequency shift. The azimuthal resolution of side-looking radar can therefore be of the same order of magnitude as that for range resolution. The key to converting the theoretical groundwork into a ``full-bodied' system is an appropriate data-processing scheme. And the simplest scheme for working, processing, and deciphering the data is optical.  相似文献   

18.
An introduction to Block Cipher Cryptanalysis   总被引:1,自引:0,他引:1  
Since the introduction of the Data Encryption Standard (DES) in the mid-1970s, block ciphers have played an ever-increasing role in cryptology. Because of the growing number of practical applications relying on their security,block ciphers have received, and are still receiving, a substantial amount of attention from academic cryptanalysts. This has led, over the last decades,to the development of several general techniques to analyze the security of block ciphers. This paper reviews the fundamental principles behind today's state of the art in block cipher cryptanalysis.  相似文献   

19.
Quality of service (QoS) is like ‘life’ — a dictionary may define the word but it does not help us understand its meaning. This paper defines what is meant by QoS in the context of packet networks. It discusses the drivers that lead to the development of QoS for IP networks in the context of the history of packet communications. The paper then presents the basic packet QoS taxonomy using the simple analogy of the postal system. It also briefly looks at potential future developments, while discussing general QoS issues throughout.  相似文献   

20.
An introduction to multisensor data fusion   总被引:33,自引:0,他引:33  
Multisensor data fusion is an emerging technology applied to Department of Defense (DoD) areas such as automated target recognition, battlefield surveillance, and guidance and control of autonomous vehicles, and to non-DoD applications such as monitoring of complex machinery, medical diagnosis, and smart buildings. Techniques for multisensor data fusion are drawn from a wide range of areas including artificial intelligence, pattern recognition, statistical estimation and other areas. This paper provides a tutorial on data fusion, introducing data fusion applications, process models, and identification of applicable techniques. Comments are made on the state-of-the-art in data fusion  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号